Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 20:36
Static task
static1
Behavioral task
behavioral1
Sample
1155a8ba9e2938719286e75474fcf847.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1155a8ba9e2938719286e75474fcf847.exe
Resource
win10v2004-20231215-en
General
-
Target
1155a8ba9e2938719286e75474fcf847.exe
-
Size
461KB
-
MD5
1155a8ba9e2938719286e75474fcf847
-
SHA1
3416c9c9b9b40f0af0b791f5466f57b75933e007
-
SHA256
064ac5bfe688e2b42940f1c79de0deef19ce0f50b660345d68e4a86e3fed5d83
-
SHA512
89874b01b4aec9de405b54b300aee377d53af4de370032ee16e7a94b893250935125d184ce7c69c748a4a0ae966fa71527937af7a0f94deb39ed8b97da663a9b
-
SSDEEP
6144:YU5npygCyAbShbUAPRNN8m7eV+wGiMQPgR47DWmvqiVNyUMJq7xU5lG:YU5nBqEhmqeVTGiM+7CmvqiVcJqilG
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0008000000012266-2.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 1220 1155a8ba9e2938719286e75474fcf847.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1220 1155a8ba9e2938719286e75474fcf847.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130KB
MD5edbca2efc4fdb3682e04c47fcd507a54
SHA10b835d29b3d57be55f8ca1c9d6c383e1aade55ff
SHA2567afd9ee080229083d62ec60b32c9f77424bcd4ee8ec30dca7b709f7a3f2a2adf
SHA5126425121a7bc263eacb2be56b515af23e87632a1f52acc97af72f6b50bcaa3967b2ab946c9703bb347ccee94ecc6e0c21c4d6a939968724d09d183e22382a3655